CVE-2022-28888

Spryker Commerce OS 1.4.2 allows Remote Command Execution.
Configurations

Configuration 1 (hide)

cpe:2.3:o:spryker:cloud_commerce:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:58

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html - Exploit, Third Party Advisory
References () http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html - () http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html -
References () http://seclists.org/fulldisclosure/2022/Jul/4 - Third Party Advisory () http://seclists.org/fulldisclosure/2022/Jul/4 - Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/May/2 - () http://seclists.org/fulldisclosure/2023/May/2 -
References () https://schutzwerk.com - Exploit, Not Applicable () https://schutzwerk.com - Exploit, Not Applicable
References () https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ - Exploit, Third Party Advisory () https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ - Exploit, Third Party Advisory

09 May 2023, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html -

09 May 2023, 04:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/May/2 -

26 Jul 2022, 11:20

Type Values Removed Values Added
References (MISC) https://schutzwerk.com - (MISC) https://schutzwerk.com - Exploit, Not Applicable
References (MISC) https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ - (MISC) https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/ - Exploit, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html - (MISC) http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html - Exploit, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/4 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/4 - Third Party Advisory
CWE CWE-78
CPE cpe:2.3:o:spryker:cloud_commerce:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8

19 Jul 2022, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html -

18 Jul 2022, 19:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/4 -

13 Jul 2022, 19:06

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-13 18:15

Updated : 2024-11-21 06:58


NVD link : CVE-2022-28888

Mitre link : CVE-2022-28888

CVE.ORG link : CVE-2022-28888


JSON object : View

Products Affected

spryker

  • cloud_commerce
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')